Paper Title:
Reasearch and Application of Honeynet Key Technique
  Abstract

Honeynet is a high-alternation honeypot. The architecture of honeynet has three kernel functions: data control, data capture and data analysis. Based on the analysis of technical characteristic of honeynet, we discuss about using honeynet to make network security recovery.

  Info
Periodical
Key Engineering Materials (Volumes 467-469)
Edited by
Dehuai Zeng
Pages
84-87
DOI
10.4028/www.scientific.net/KEM.467-469.84
Citation
D. L. Zhang, W. C. Jiao, "Reasearch and Application of Honeynet Key Technique", Key Engineering Materials, Vols. 467-469, pp. 84-87, 2011
Online since
February 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Ting Zhang, Lin Hong Guo
Chapter 10: Environmentally Sustainable Manufacturing Processes and Systems
Abstract:The key problem of the network and information security is protect the computer system and network effectively. An open virtual experiment...
2221
Authors: Huang Xin, Si Dong Yu, Rong Ze Wan
Chapter 3: Information Technologies, WEB and Networks Engineering, Information Security, E-Engineering, Software Application and Development
Abstract:With the development of digital campus construction, the campus network size has been rapid growth, but there are also many network security...
1560
Authors: Lei Sun, Hong Mei Xing, Shu Yan Zhang
Chapter 5: Computer, Communication, Information, Algorithms and Numerical Methods of Data Processing Engineering
Abstract:Protection object of data center is Botnet according to IRC (Internet Relay Chat) [2] protocol to spread. However, in order to be more covert...
1411